angelhack
Campus Hub NIT
Sri.
whoami
- Student @ NIT Srinagar
- CyberSec Enthusiast
- Stock Market
- Blogger
- Movies, Songs
- CTF Player
- Hacking Hardwares
- OSINT for Fun
- HiddenEye Developer
- Evilginx2 Contributor
- TryHackMe Top 1%
- HackTheBox : Hacker
CERTIFICATIONS
THM - Offensive Pentesting
THM - Web Fundamentals
THM - CompTIA Pentest+
Pentester Lab - Intro Badge
Pentester Lab - PCAP Badge
Pentester Lab - Recon Badge
Pentester Lab - Unix Badge
Practical Buffer Overflow For OSCP
GPCSSI 2021
eJPT (Upcoming)
CEH Practical (Upcoming)
Udayveer Singh
@an0nud4y
CONTACT
Twitter : @an0nud4y
Insta : @its_udy
Mail : anonud4y@gmail.com
To Know Multiple Platform Profiles
https://linktr.ee/its_udy
Table Of
Contents
Intro to Cybersecurity
Types of Job Roles in Cybersec
Roadmap & Resources
Getting involved with infosec Community
Hackers to Follow on Social Media
Hacking Podcasts to listen
Certifications You Should Have
Building Your Resume
Making Money in Cybersec
My Goals (Understanding
Plan/Goal Setting)
Intro to
Cybersecurity
What is CyberSecurity ??
Cybersecurity is the art of protecting/recovering networks, devices, and data from unauthorized access or
criminal use and the practice of ensuring confidentiality, integrity, and availability of information. (Acording
to CISA)
Why we need Cybersecurity ??
-To Reduce the Risk of Data Breaches and attacks from Black Hat Hackers (APT and
Individual Hacking Groups).
- To Prevent Unauthorized access to sensitive information
- To Prevent Services Disruption (Like denial-of-service attacks)
-There are lot more reasons like (Ensuring Business continuity, Protecting from
network exploitations from outsiders)
Reference Blogs
https://medium.com/@ IamLucif3r/what-is-cyber-security-268cccd0f4eb
https://medium.com/beyondx/what-is-cybersecurity-64a5f61cd0e3
Types of Job
Roles
- E t h i c a l H a c k e r / P e n e t r a t i o nT e s t e r
- C h i e f I n f o r m a t i o n S e c u r i t y o f f i c e r ( C I S O )
- M a l w a r e A n a l y s t
- E x p l o i t D e v e l o p e r
- I n c i d e n t r e s p o n d e r / F o r e n s i c A n a l y s t
- C r y p t o g r a p h e r
- S e c u r i t y A r c h i t e c t
- S e c u r i t y E n g i n e e r
- S e c u r i t y A n a l y s t
- S e c u r i t y C o n s u l t a n t
- S e c u r i t y R e s e a r c h e r s
References
https://vickieli.medium.com/cybersecurity-careers-your-options-8999bd8254e5
https://somyt536.medium.com/what-are-the-various-job-roles-offered-in-cybersecurity-942d5885170c
https://medium.com/@shankarbala95/cybersecurity-its-various-roles-that-you-should-know-8d8f1ef6e1cd
Let's Understand these Job Roles ...
Ethical Hacker / Penetration Tester
- Hacking for good with written permission.
- Simulation Attacks on Network.
- Tries Not to Harm the infrastucture during Live attacks.
- Takes care of informative to High impact bugs.
- Provides a full test report and finding (Report writting).
- Need Good Communication skills.
- Part of Red team
Chief information Security Officer (CISO)
- Head of Security Team
- Directs the Strategy, operations & Budget for security.
- Responsible for major Security Decisions
Malware Analyst
- Identifies malware in a Computer or Network.
- Reverse Engineer malware to understand its functionality.
- Identifies ways to detect and prevent the malware from spreading.
Let's Understand these Job Roles ...
Exploit Developer
-Uses research and findings to creates exploit
codes to exploit the vulnerabilities.
Incident Responder /
Forensic Analyst
- Helps to analyze/recover erased/encrypted
data.
- Analyzes and Monitors all network activities
and logs.
- Helps to identify intrusions or suspicious
activities inside network.
- Part of Blue Team.
- Works with Red team to fix the Bugs and
Vulnerabilities
Cryptographer
-Develops algorithms and security systems to encrypt Confidential
information.
Let's Understand these Job Roles ...
Security Architect
-Develops and organizes secured computer systems and networks
to protect confidential information from hackers.
Security Engineer
-Liable for testing and screening various security software
employed, for improving organizational security.
Security Analyst
-Performs several security related operations such as password
complexity, data loss mitigation, and other security practices.
Security Consultant
- Position Mostly found in small organisations.
-Helps to strengthen security , by providing consultation and
technical help.
Let's Understand these Job Roles ...
Security Researchers
-They helps to predict the future vulnerabilities by tracking current
vulnerabilities.
-Research on products to find unknown or zero day vulnerabilities,
which may be actively being exploited.
To Know about Life of a Security Researcher , Check
out this blog
https://cybersecurity.att.com/blogs/security-essentials/the-life-of-a-
security-researcher
Reference: https://hbothra22.medium.com/how-do-i-get-started-in-cyber-security-my-
perspective-learning-path-b53065189ba5
Learn365 : https://github.com/harsh-bothra/learn365
Mindmap By: Harsh
Bothra
Roadmap &
Resources
List of Resources
1. TryHackMe Pathways + Labs
2. HackTheBox Machines
3. HackTheBox Academy Modules
4. TCM-Sec Courses
5. Tiberius Privesc Courses
6. Naga Sai Nikhil Courses
7. Portswigger Academy
8. PentesterLab Badges
9. Bug Bounty Courses By XSSRAT and Offensive Hunter
10. Pentester Academy
11. Hacker101 Resources
12. OWASP TOP10
13. Google
Roadmap &
Resources
Extra Resources
BugCrowd University
Nahamsec BB(BugBounty) Roadmap
Medium Blog Writeups
HackerOne BB Disclosed Reports
Zseano's BB Methodology
Pentester Land Bu
gBountyHunter
Intigriti Hackademy
Reference
https://securitytrails.com/blog/popular-bug-bounty-courses
Download Roadmap
Click Here
Getting involved with infosec
Community
Where to Find Good(Ethical) hackers ??
Twitter - Most hackers/Researchers are on twitter.
Youtube - They also helps Community to learn through Youtube
Discord - They Have Discord Servers to talk/share stuffs with each other.
Medium - They helps Community by writing there work/findings.
Reddit - Infosec thread.
Linkedin - They Have professional profiles too.
Forums - You can Find Black Hat Hackers too.
Github - They helps community by building tools and sharing there tools.
Telegram - Some awesome Groups are there.
So What to do ?? Where to start from ??
Join Twitter Today, and Follow the Hackers mentioned in next slide.
List of Hackers to Follow
Twitter
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-
Hunters/blob/master/assets/media.md#twitter
Youtube
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-
Hunters/blob/master/assets/media.md#youtube-channels
Streamers
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-
Hunters/blob/master/assets/media.md#streamers
Discord Servers
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-
Hunters/blob/master/assets/media.md#discord-servers
Podcasts/Books for Cybersecurity
Podcasts
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-
Hunters/blob/master/assets/media.md#podcasts
Books
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-
Hunters/blob/master/assets/media.md#books
News/Updates of Cybersecurity
Telegram
https://www.sentinelone.com/blog/top-10-telegram-cybersecurity-groups-you-should- j
oin/
Websites
https://www.usefulblogging.com/cybersecurity-websites-to-follow/
Certifications
Few Certifications Recommended For Beginners
eJPT
CEH (Practical)
PNPT
eWPT (Get
Portswigger
Cert if
Possible)
eWPTX
eCPPT
eCPPT
x
OSCP
OSWE
Resume Building
Understand From Experts in Infosec
John Hammond
https://youtu.be/ZAt8MM8WG0o
Jhaddix/Nahamsec
https://youtu.be/Zs28J_SDXYQ
Making Money in Cybersec
Bug Bounty Hunting
Hackerone
Bugcrowd
Open Bug Bounty
YesWeHack
intigriti
Synack Red Team
(SRT)
Reference :
https://www.hackero
ne.com/ethical-
hacker/how-become-
successful-bug-bount
y-hunter
Other Ways
Penetration Testing (On demand)
My
Goals
Twitter thread
https://twitter.com/an0nud4y/status/1457545560076873736
Roadmap To Cybersecurity master as a guide .ppt

Roadmap To Cybersecurity master as a guide .ppt

  • 1.
  • 2.
    whoami - Student @NIT Srinagar - CyberSec Enthusiast - Stock Market - Blogger - Movies, Songs - CTF Player - Hacking Hardwares - OSINT for Fun - HiddenEye Developer - Evilginx2 Contributor - TryHackMe Top 1% - HackTheBox : Hacker CERTIFICATIONS THM - Offensive Pentesting THM - Web Fundamentals THM - CompTIA Pentest+ Pentester Lab - Intro Badge Pentester Lab - PCAP Badge Pentester Lab - Recon Badge Pentester Lab - Unix Badge Practical Buffer Overflow For OSCP GPCSSI 2021 eJPT (Upcoming) CEH Practical (Upcoming) Udayveer Singh @an0nud4y CONTACT Twitter : @an0nud4y Insta : @its_udy Mail : anonud4y@gmail.com To Know Multiple Platform Profiles https://linktr.ee/its_udy
  • 3.
    Table Of Contents Intro toCybersecurity Types of Job Roles in Cybersec Roadmap & Resources Getting involved with infosec Community Hackers to Follow on Social Media Hacking Podcasts to listen Certifications You Should Have Building Your Resume Making Money in Cybersec My Goals (Understanding Plan/Goal Setting)
  • 4.
    Intro to Cybersecurity What isCyberSecurity ?? Cybersecurity is the art of protecting/recovering networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information. (Acording to CISA) Why we need Cybersecurity ?? -To Reduce the Risk of Data Breaches and attacks from Black Hat Hackers (APT and Individual Hacking Groups). - To Prevent Unauthorized access to sensitive information - To Prevent Services Disruption (Like denial-of-service attacks) -There are lot more reasons like (Ensuring Business continuity, Protecting from network exploitations from outsiders) Reference Blogs https://medium.com/@ IamLucif3r/what-is-cyber-security-268cccd0f4eb https://medium.com/beyondx/what-is-cybersecurity-64a5f61cd0e3
  • 5.
    Types of Job Roles -E t h i c a l H a c k e r / P e n e t r a t i o nT e s t e r - C h i e f I n f o r m a t i o n S e c u r i t y o f f i c e r ( C I S O ) - M a l w a r e A n a l y s t - E x p l o i t D e v e l o p e r - I n c i d e n t r e s p o n d e r / F o r e n s i c A n a l y s t - C r y p t o g r a p h e r - S e c u r i t y A r c h i t e c t - S e c u r i t y E n g i n e e r - S e c u r i t y A n a l y s t - S e c u r i t y C o n s u l t a n t - S e c u r i t y R e s e a r c h e r s References https://vickieli.medium.com/cybersecurity-careers-your-options-8999bd8254e5 https://somyt536.medium.com/what-are-the-various-job-roles-offered-in-cybersecurity-942d5885170c https://medium.com/@shankarbala95/cybersecurity-its-various-roles-that-you-should-know-8d8f1ef6e1cd
  • 6.
    Let's Understand theseJob Roles ... Ethical Hacker / Penetration Tester - Hacking for good with written permission. - Simulation Attacks on Network. - Tries Not to Harm the infrastucture during Live attacks. - Takes care of informative to High impact bugs. - Provides a full test report and finding (Report writting). - Need Good Communication skills. - Part of Red team Chief information Security Officer (CISO) - Head of Security Team - Directs the Strategy, operations & Budget for security. - Responsible for major Security Decisions Malware Analyst - Identifies malware in a Computer or Network. - Reverse Engineer malware to understand its functionality. - Identifies ways to detect and prevent the malware from spreading.
  • 7.
    Let's Understand theseJob Roles ... Exploit Developer -Uses research and findings to creates exploit codes to exploit the vulnerabilities. Incident Responder / Forensic Analyst - Helps to analyze/recover erased/encrypted data. - Analyzes and Monitors all network activities and logs. - Helps to identify intrusions or suspicious activities inside network. - Part of Blue Team. - Works with Red team to fix the Bugs and Vulnerabilities Cryptographer -Develops algorithms and security systems to encrypt Confidential information.
  • 8.
    Let's Understand theseJob Roles ... Security Architect -Develops and organizes secured computer systems and networks to protect confidential information from hackers. Security Engineer -Liable for testing and screening various security software employed, for improving organizational security. Security Analyst -Performs several security related operations such as password complexity, data loss mitigation, and other security practices. Security Consultant - Position Mostly found in small organisations. -Helps to strengthen security , by providing consultation and technical help.
  • 9.
    Let's Understand theseJob Roles ... Security Researchers -They helps to predict the future vulnerabilities by tracking current vulnerabilities. -Research on products to find unknown or zero day vulnerabilities, which may be actively being exploited. To Know about Life of a Security Researcher , Check out this blog https://cybersecurity.att.com/blogs/security-essentials/the-life-of-a- security-researcher
  • 10.
  • 11.
    Roadmap & Resources List ofResources 1. TryHackMe Pathways + Labs 2. HackTheBox Machines 3. HackTheBox Academy Modules 4. TCM-Sec Courses 5. Tiberius Privesc Courses 6. Naga Sai Nikhil Courses 7. Portswigger Academy 8. PentesterLab Badges 9. Bug Bounty Courses By XSSRAT and Offensive Hunter 10. Pentester Academy 11. Hacker101 Resources 12. OWASP TOP10 13. Google
  • 12.
    Roadmap & Resources Extra Resources BugCrowdUniversity Nahamsec BB(BugBounty) Roadmap Medium Blog Writeups HackerOne BB Disclosed Reports Zseano's BB Methodology Pentester Land Bu gBountyHunter Intigriti Hackademy Reference https://securitytrails.com/blog/popular-bug-bounty-courses
  • 13.
  • 14.
    Getting involved withinfosec Community Where to Find Good(Ethical) hackers ?? Twitter - Most hackers/Researchers are on twitter. Youtube - They also helps Community to learn through Youtube Discord - They Have Discord Servers to talk/share stuffs with each other. Medium - They helps Community by writing there work/findings. Reddit - Infosec thread. Linkedin - They Have professional profiles too. Forums - You can Find Black Hat Hackers too. Github - They helps community by building tools and sharing there tools. Telegram - Some awesome Groups are there. So What to do ?? Where to start from ?? Join Twitter Today, and Follow the Hackers mentioned in next slide.
  • 15.
    List of Hackersto Follow Twitter https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty- Hunters/blob/master/assets/media.md#twitter Youtube https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty- Hunters/blob/master/assets/media.md#youtube-channels Streamers https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty- Hunters/blob/master/assets/media.md#streamers Discord Servers https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty- Hunters/blob/master/assets/media.md#discord-servers
  • 16.
  • 17.
    News/Updates of Cybersecurity Telegram https://www.sentinelone.com/blog/top-10-telegram-cybersecurity-groups-you-should-j oin/ Websites https://www.usefulblogging.com/cybersecurity-websites-to-follow/
  • 18.
    Certifications Few Certifications RecommendedFor Beginners eJPT CEH (Practical) PNPT eWPT (Get Portswigger Cert if Possible) eWPTX eCPPT eCPPT x OSCP OSWE
  • 19.
    Resume Building Understand FromExperts in Infosec John Hammond https://youtu.be/ZAt8MM8WG0o Jhaddix/Nahamsec https://youtu.be/Zs28J_SDXYQ
  • 20.
    Making Money inCybersec Bug Bounty Hunting Hackerone Bugcrowd Open Bug Bounty YesWeHack intigriti Synack Red Team (SRT) Reference : https://www.hackero ne.com/ethical- hacker/how-become- successful-bug-bount y-hunter Other Ways Penetration Testing (On demand)
  • 21.